Panayiotis Mavrommatis
Panayiotis Mavrommatis
Verified email at - Homepage
Cited by
Cited by
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
The Ghost in the Browser: Analysis of Web-based Malware.
N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu
HotBots 7, 4-4, 2007
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Intrusive software management
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent App. 12/041,309, 2009
Identifying known and unknown peer-to-peer traffic
F Constantinou, P Mavrommatis
Fifth IEEE International Symposium on Network Computing and Applications …, 2006
Cybercrime 2.0: when the cloud turns dark
N Provos, MA Rajab, P Mavrommatis
Communications of the ACM 52 (4), 42-47, 2009
Trends and lessons from three years fighting malicious extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
24th USENIX Security Symposium (USENIX Security 15), 579-593, 2015
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware.
M Polychronakis, N Provos
LEET 8, 1-8, 2008
Detecting an intrusive landing page
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent 8,019,700, 2011
CAMP: Content-Agnostic Malware Protection.
MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos
NDSS, 2013
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.
MA Rajab, L Ballard, P Mavrommatis, N Provos, X Zhao
LEET, 2010
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
Trends in circumventing web-malware detection
M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ...
Google, Google Technical Report 168, 2011
All your iframes point to us
NPP Mavrommatis, M Monrose
USENIX security symposium, 1-16, 2008
Protecting users from undesirable content
MG Morrissey, R Cannings, JB Gruver, A Ghosh, JB Larimer, AD Stadler, ...
US Patent App. 13/633,093, 2014
Email-based worm propagation properties
P Gopalan, K Jamieson, P Mavrommatis
US Patent App. 11/387,087, 2007
Automated implementation of complex distributed algorithms specified in the IOA language
C Georgiou, N Lynch, P Mavrommatis, JA Tauber
International Journal on Software Tools for Technology Transfer 11, 153-171, 2009
Exploit-based worm propagation mitigation
P Gopalan, K Jamieson, P Mavrommatis
US Patent 8,006,306, 2011
Intrusive software management
Y Zhou, N Provos, CW Bavor, EL Davis Jr, M Palatucci, KP Nigam, ...
US Patent 8,515,896, 2013
Detecting pirated applications
A Bhatia, MG Kang, MI Sharif, N Provos, P Mavrommatis, S Bandhakavi
US Patent 8,875,303, 2014
The system can't perform the operation now. Try again later.
Articles 1–20